Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15581212150000C2BAA134DC8E4E0761EA383F20ACFE25DC5A5B546ADE7EED71F6167EC |
|
CONTENT
ssdeep
|
48:kDgoory13EL13u13233g89lww0wGTGfHSTOVXTxRGE2fZgNPYM/7xEpl03FhgOjQ:9w3A3M3M3ge07iX+EqZglYMTxEpp1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d9d976662626662c |
|
VISUAL
aHash
|
f8f8f8f818000000 |
|
VISUAL
dHash
|
30323232320c0000 |
|
VISUAL
wHash
|
fcfcfcf8f8e08000 |
|
VISUAL
colorHash
|
000000001c0 |
|
VISUAL
cropResistant
|
081c1c1c1a1c1c03,30323232320c0000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 22 techniques to evade detection by security scanners and make reverse engineering more difficult.